Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe
-
Size
280KB
-
MD5
0d7658db4b0a50da84fbb27a219da59d
-
SHA1
ac3814114fa296299cba45880484de5c8865a196
-
SHA256
0cbf77532f92433b8cb26b025ab0b8956e101b1b58bbca565681213426e70bfc
-
SHA512
3828f133ee7798084a712314d70183aed356de05d73bad28d1d23ed52138e8b9b7c5758e93767bb00bfcd061a6ed06ad5771d475b37d68ef0b9690e7293326d9
-
SSDEEP
6144:JQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:JQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000\Control Panel\International\Geo\Nation 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe -
Executes dropped EXE 2 IoCs
pid Process 2680 csrssys.exe 5032 csrssys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\ = "Application" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\shell\runas 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\Content-Type = "application/x-msdownload" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\shell 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\Content-Type = "application/x-msdownload" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\csrssys.exe\" /START \"%1\" %*" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\DefaultIcon 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\Local Settings 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\DefaultIcon 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\shell\runas\command 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\DefaultIcon\ = "%1" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\shell\runas\command\ = "\"%1\" %*" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\shell\runas\command\IsolatedCommand = "\"%1\" %*" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\ = "wexplorer" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\shell\open 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\DefaultIcon\ = "%1" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\shell\runas 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\shell\open\command 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\wexplorer\shell 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\shell\open\command 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\shell\open 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Set value (str) \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Sys32\\csrssys.exe\" /START \"%1\" %*" 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe Key created \REGISTRY\USER\S-1-5-21-4092317236-2027488869-1227795436-1000_Classes\.exe\shell\runas\command 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2680 csrssys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4340 wrote to memory of 2680 4340 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe 87 PID 4340 wrote to memory of 2680 4340 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe 87 PID 4340 wrote to memory of 2680 4340 2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe 87 PID 2680 wrote to memory of 5032 2680 csrssys.exe 88 PID 2680 wrote to memory of 5032 2680 csrssys.exe 88 PID 2680 wrote to memory of 5032 2680 csrssys.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-17_0d7658db4b0a50da84fbb27a219da59d_mafia_nionspy.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\csrssys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\csrssys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Sys32\csrssys.exe"3⤵
- Executes dropped EXE
PID:5032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5a9e21d36f64ef67cc6ffcdf65c30e81a
SHA14a1fe08f7cf007578a072672590a54ce843d2922
SHA256d248fa1698a71da9a2f06112c95ebc6c9322df14f1bbd8a0d728a460de337268
SHA5120ff8b1e6919e8182238a2c19cae434e2b41c1b222d7f20741f485786f280359832efab10b706c956981b3793d706075f49f597b422a6d596e313c343524adad1